--- /dev/null 2008-03-05 09:51:41.697912024 -0700
+++ pootleupdate/root/etc/e-smith/locale/da/etc/e-smith/web/functions/remoteuseraccess 2008-03-11 02:22:09.000000000 -0600
@@ -0,0 +1,86 @@
+
+
+ User Remote Access
+ User Remote Access
+
+
+ SSH keys
+ SSH keys
+
+
+ FORM_TITLE
+ Change user remote access settings
+
+
+ CURRENT_LIST_OF_USERS
+ Current list of users
+
+
+ LABEL_USER
+ Konto
+
+
+ LABEL_FULLNAME
+ Brugernavn
+
+
+ SHELL_ACCESS
+ Shell
+
+
+ SUDO
+ Sudo
+
+
+ SSH_KEYS
+ SSH Keys
+
+
+ CHROOT_PATH
+ Chroot Path
+
+
+ CHROOT_PATH_NOT_GIVEN
+ Chroot Path not given
+
+
+ CHROOT_PATH_NON_EXISTANT
+ Chroot Path does not exist
+
+
+ SELECT_CHROOT_PATH
+ Select Chroot Path
+
+
+ VPN_ACCESS
+ RSSH + VPN Access
+
+
+ SHELL_ACCESS
+ Shell Access
+
+
+ SUDOER_ACCESS
+ Sudo Access
+
+
+ NO_ACCOUNTS
+ Der findes ingen brugerkonti i systemet.
+
+
+ SUCCESS
+ Success
+
+
+ MODIFY_DESCRIPTION
+ Enabling bash shell access for a user account poses a security risk. Only use this option if you know what you are doing. A safer option is to allow rssh access (sftp, ssh & rsync).
Sudo access allows users to execute commands with the permissions of the root account without knowing the root password. This is more desirable than passing around the root password. Setting Sudo to yes also sets the shell to bash
SHELL, VPN & FTP access for users depend on the settings in the Remote Access Panel being opened.
Select an FTP Chroot path from the drop down box or enter it in the text field, the selection will overwrite the text field.
Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".
]]>
+
+
+ SSHKEYS_DESCRIPTION
+ Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".
+
+
+ INVALID_USER
+ Invalid user
+
+
--- smeserver-remoteuseraccess-1.2/root/etc/e-smith/locale/de/etc/e-smith/web/functions/remoteuseraccess 2006-11-09 09:22:28.000000000 -0700
+++ pootleupdate/root/etc/e-smith/locale/de/etc/e-smith/web/functions/remoteuseraccess 2008-03-11 02:22:39.000000000 -0600
@@ -1,62 +1,40 @@
-
- Security
- Sicherheit
+ User Remote Access
+ Benutzer-Fernzugriff
- User Remote Access
- Benutzer-Fernzugriff
+ SSH keys
+ SSH Schlüssel
- Your Settings
- Ihre Einstellungen
-
-
- SSH keys
- SSH Schlssel
-
-
-
FORM_TITLE
-
- Online-Handbuch
- ]]>
-
+ Online-Handbuch ]]>
-
CURRENT_LIST_OF_USERS
Aktuelle Liste der Benutzer
-
LABEL_USER
Benutzerkonto
-
LABEL_FULLNAME
Benutzername
-
SHELL_ACCESS
Shell
-
SUDO
Sudo
-
SSH_KEYS
- SSH Schlssel
+ SSH Schlüssel
-
CHROOT_PATH
Chroot Pfad
@@ -69,96 +47,40 @@
CHROOT_PATH_NON_EXISTANT
Chroot Pfad Falscher
-
SELECT_CHROOT_PATH
- Chroot Pfad auswhlen
+ Chroot Pfad auswählen
-
VPN_ACCESS
VPN Zugang
-
SHELL_ACCESS
Shell Zugang
-
SUDOER_ACCESS
Sudo Zugang
-
-
- MODIFY
- ndern
-
-
NO_ACCOUNTS
Es sind keine Benutzerkonten im System angelegt.
-
-
- YES
- Ja
-
-
-
- NO
- Nein
-
-
-
- SAVE
- Speichern
-
-
SUCCESS
- Die neuen Fernzugriffeinstellungen fr Benutzer wurden gespeichert.
+ Die neuen Fernzugriffeinstellungen für Benutzer wurden gespeichert.
-
MODIFY_DESCRIPTION
-
- WARNUNG: Das Aktivieren von Shell-Zugngen fr Benutzerkonten stellt ein grosses Sicherheitsrisiko dar und
- setzt Ihr Netzwerk erheblichen Gefahren aus. Benutzen Sie diese Funktion nicht leichtfertig,
- ohne das Sie diese Funktion richtig verstehen.
-
-
- Mit dem Sudo-Zugang knnen Benutzer Befehle mit root-Rechten, aber ohne root-Kennwort ausfhren.
- Das ist sicherer, als wenn das root-Kennwort beliebig of weitergegeben wird.
- Zustzlich erhalten die Benutzer mit dem Sudo-Zugang auch eine Bash-Shell.
-
-
- Voraussetzung fr den VPN und FTP Zugang fr Benutzer ist, dass im Server-Manager im Register
- Fernzugriff PPTP und FTP geffnet sind.
-
-
- Whlen Sie einen FTP Chroot Pfad aus der Auswahlliste aus oder geben Sie ihn direkt im Textfeld Chroot Pfad ein.
- Eingaben im Textfeld werden durch Auswahl aus der Liste berschrieben.
-
- ]]>
-
+ WARNUNG: Das Aktivieren von Shell-Zugängen für Benutzerkonten stellt ein grosses Sicherheitsrisiko dar und setzt Ihr Netzwerk erheblichen Gefahren aus. Benutzen Sie diese Funktion nicht leichtfertig, ohne das Sie diese Funktion richtig verstehen. Mit dem Sudo-Zugang können Benutzer Befehle mit root-Rechten, aber ohne root-Kennwort ausführen. Das ist sicherer, als wenn das root-Kennwort beliebig of weitergegeben wird. Zusätzlich erhalten die Benutzer mit dem Sudo-Zugang auch eine Bash-Shell.
Voraussetzung für den VPN und FTP Zugang für Benutzer ist, dass im Server-Manager im Register Fernzugriff PPTP und FTP geöffnet sind.
Wählen Sie einen FTP Chroot Pfad aus der Auswahlliste aus oder geben Sie ihn direkt im Textfeld Chroot Pfad ein. Eingaben im Textfeld werden durch Auswahl aus der Liste überschrieben.
]]>
-
SSHKEYS_DESCRIPTION
-
- Fr den SSH-Zugang ohne Kennwort geben Sie bitte den ffentlichen SSH-Schlssel ein.
- Der Schlssel sollte als ganze Zeile kopiert und eingefgt werden, erscheint dann allerdings
- auf dem Bildschirm in 3 Zeilen. Um den Schlssel zu lschen, geben Sie "Schlssel lschen" ein.
-
- ]]>
-
+ Für den SSH-Zugang ohne Kennwort geben Sie bitte den öffentlichen SSH-Schlüssel ein. Der Schlüssel sollte als ganze Zeile kopiert und eingefügt werden, erscheint dann allerdings auf dem Bildschirm in 3 Zeilen. Um den Schlüssel zu löschen, geben Sie "deletekeys" ein.
INVALID_USER
Falscher Benutzer
-
--- /dev/null 2008-03-05 09:51:41.697912024 -0700
+++ pootleupdate/root/etc/e-smith/locale/el/etc/e-smith/web/functions/remoteuseraccess 2008-03-11 02:23:11.000000000 -0600
@@ -0,0 +1,86 @@
+
+
+ User Remote Access
+ User Remote Access
+
+
+ SSH keys
+ SSH keys
+
+
+ FORM_TITLE
+ Change user remote access settings
+
+
+ CURRENT_LIST_OF_USERS
+ Current list of users
+
+
+ LABEL_USER
+ Account
+
+
+ LABEL_FULLNAME
+ Όνομα χρήστη
+
+
+ SHELL_ACCESS
+ Shell
+
+
+ SUDO
+ Sudo
+
+
+ SSH_KEYS
+ SSH Keys
+
+
+ CHROOT_PATH
+ Chroot Path
+
+
+ CHROOT_PATH_NOT_GIVEN
+ Chroot Path not given
+
+
+ CHROOT_PATH_NON_EXISTANT
+ Chroot Path does not exist
+
+
+ SELECT_CHROOT_PATH
+ Select Chroot Path
+
+
+ VPN_ACCESS
+ RSSH + VPN Access
+
+
+ SHELL_ACCESS
+ Shell Access
+
+
+ SUDOER_ACCESS
+ Sudo Access
+
+
+ NO_ACCOUNTS
+ Δεν υπάρχει κανένας λογαριασμός χρηστών στο σύστημα.
+
+
+ SUCCESS
+ Success
+
+
+ MODIFY_DESCRIPTION
+ Enabling bash shell access for a user account poses a security risk. Only use this option if you know what you are doing. A safer option is to allow rssh access (sftp, ssh & rsync). Sudo access allows users to execute commands with the permissions of the root account without knowing the root password. This is more desirable than passing around the root password. Setting Sudo to yes also sets the shell to bash
SHELL, VPN & FTP access for users depend on the settings in the Remote Access Panel being opened.
Select an FTP Chroot path from the drop down box or enter it in the text field, the selection will overwrite the text field.
Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".
]]>
+
+
+ SSHKEYS_DESCRIPTION
+ Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".
+
+
+ INVALID_USER
+ Invalid user
+
+
--- smeserver-remoteuseraccess-1.2/root/etc/e-smith/locale/es/etc/e-smith/web/functions/remoteuseraccess 2007-01-23 05:42:17.000000000 -0700
+++ pootleupdate/root/etc/e-smith/locale/es/etc/e-smith/web/functions/remoteuseraccess 2008-03-11 02:23:41.000000000 -0600
@@ -1,168 +1,86 @@
-
-
-
-
- Security
- Seguridad
-
-
- User Remote Access
- Acceso Remoto del Usuario
-
-
- Your Settings
- Sus Preferencias
-
-
- SSH keys
- Llaves SSH
-
-
-
- FORM_TITLE
- Cambiar Preferencias del Acceso Remoto para Usuarios
-
-
-
- CURRENT_LIST_OF_USERS
- Lista actualizada de usuarios
-
-
-
- LABEL_USER
- Cuenta
-
-
-
- LABEL_FULLNAME
- Nombre del usuario
-
-
-
- SHELL_ACCESS
- Shell
-
-
-
- SUDO
- Sudo
-
-
-
- SSH_KEYS
- Llaves SSH
-
-
-
- CHROOT_PATH
- Ruta Chroot
-
-
- CHROOT_PATH_NOT_GIVEN
- No ha detectado ruta chroot
-
-
- CHROOT_PATH_NON_EXISTANT
- Ruta chroot no existe
-
-
-
- SELECT_CHROOT_PATH
- Selecciona Ruta Chroot
-
-
-
- VPN_ACCESS
- Acceso RSSH y VPN
-
-
-
- SHELL_ACCESS
- Acceso Shell
-
-
-
- SUDOER_ACCESS
- Acceso sudo
-
-
-
-
- MODIFY
- Modificar
-
-
-
- NO_ACCOUNTS
- No hay cuenta del usuario en el sistema.
-
-
-
- YES
- Si
-
-
-
- NO
- No
-
-
-
- SAVE
- Guardar
-
-
-
- SUCCESS
- Completada con Exito
-
-
-
- MODIFY_DESCRIPTION
-
- Si activas el acceso del bash shell para un usuario, es un riesgo en la seguridad.
- Este opción es recomendada solamente si conoce lo que estas haciendo. La opción mas segura
- es permitir acceso rssh (sftp, ssh & rsync).
-
-
- Acceso sudo permite a los usuarios ejecutar comandos con los permisos
- del usuario root sin saber la clave de root. Esto es mejor que dar la clave del
- usuario root. Si activas el Sudo, también se cambia el shell a bash.
-
-
- Acceso al SHELL, VPN & FTP por los usuarios depende en las preferencias del
- Panel de Acceso Remoto sea actualizada.
-
-
- Selecciona una ruta FTP Chroot desde el cuadro de selecciones o lo pones en el espacio
- de texto. La selección cambiara el contenido.
-
-
- Introduzca la clave publica SSH para permitir el acceso ssh sin clave.
- Necesitan introducir la clave SSH en una sola linea, pero va a aparecer en múltiples lineas.
- Para borrar todas las claves, teclee "deletekeys".
-
- ]]>
-
-
-
-
- SSHKEYS_DESCRIPTION
-
- Introduzca la clave publica SSH para permitir el acceso ssh sin clave.
- Necesita introducir la clave SSH en una sola linea, pero va a aparecer en múltiples lineas.
- Para borrar todas las claves, teclee "deletekeys".
-
- ]]>
-
-
-
-
- INVALID_USER
- Usuario Invalido
-
-
-
+
+
+ User Remote Access
+ Acceso de Usuario Remoto
+
+
+ SSH keys
+ Claves SSH
+
+
+ FORM_TITLE
+ Cambiar preferencias del acceso de usuario remoto
+
+
+ CURRENT_LIST_OF_USERS
+ Lista actual de usuarios
+
+
+ LABEL_USER
+ Cuenta
+
+
+ LABEL_FULLNAME
+ Nombre de Usuario
+
+
+ SHELL_ACCESS
+ Shell
+
+
+ SUDO
+ Sudo
+
+
+ SSH_KEYS
+ Claves SSH
+
+
+ CHROOT_PATH
+ Ruta Chroot
+
+
+ CHROOT_PATH_NOT_GIVEN
+ No ha proporcionado la ruta chroot
+
+
+ CHROOT_PATH_NON_EXISTANT
+ Ruta chroot no existe
+
+
+ SELECT_CHROOT_PATH
+ Seleccionar Ruta Chroot
+
+
+ VPN_ACCESS
+ Acceso RSSH y VPN
+
+
+ SHELL_ACCESS
+ Acceso Shell
+
+
+ SUDOER_ACCESS
+ Acceso sudo
+
+
+ NO_ACCOUNTS
+ No hay cuentas de usuario en el sistema.
+
+
+ SUCCESS
+ Completada con éxito
+
+
+ MODIFY_DESCRIPTION
+ Activar el acceso bash shell para un usuario contrae aparejado un riesgo para la seguridad. Solo utilice esta opción si sabe lo que esta haciendo. La opción mas segura es permitir acceso rssh (sftp, ssh & rsync). Acceso sudo permite a los usuarios ejecutar comandos con los permisos del usuario root sin saber la contraseña de root. Esto es mejor que dar la contraseña del usuario root. Activando Sudo, también se cambia el shell a bash
El acceso de los usuarios a SHELL, VPN & FTP dependerá de que la configuración del Panel de Acceso Remoto sea actualizada.
Seleccionar una ruta FTP Chroot desde el cuadro de selecciones o introduzcalo en el campo de texto. La selección sobre-escribirá el campo de texto.
Introduzca la clave publica SSH para permitir el acceso ssh sin clave. La clave SSH debe introducirse en una sola linea, pero aparecerá en múltiples lineas. Para borrar todas las claves, ecriba "deletekeys".
]]>
+
+
+ SSHKEYS_DESCRIPTION
+ Introduzca la clave publica SSH para permitir el acceso ssh sin clave. Necesita introducir la clave SSH en una sola linea, pero va a aparecer en múltiples lineas. Para borrar todas las claves, teclee "deletekeys".
+
+
+ INVALID_USER
+ Usuario inválido
+
+
--- smeserver-remoteuseraccess-1.2/root/etc/e-smith/locale/fr/etc/e-smith/web/functions/remoteuseraccess 2008-03-11 02:11:34.000000000 -0600
+++ pootleupdate/root/etc/e-smith/locale/fr/etc/e-smith/web/functions/remoteuseraccess 2008-03-11 02:24:12.000000000 -0600
@@ -1,160 +1,86 @@
-
-
- Security
- \n Scurit\n
-
-
- User Remote Access
- Accs distance Utilisateur
-
- Your Settings
- Vos paramtres
+ User Remote Access
+ Accès à distance Utilisateur
- SSH keys
- Cls SSH
+ SSH keys
+ Clés SSH
-
FORM_TITLE
- Changer les paramtres d'accs distance des utilisateurs
+ Modifier les paramètres d'accès à distance des utilisateurs
-
CURRENT_LIST_OF_USERS
Liste des utilisateurs
-
LABEL_USER
Compte
-
LABEL_FULLNAME
Nom de l'utilisateur
-
SHELL_ACCESS
Shell
-
SUDO
Sudo
-
SSH_KEYS
- Cls SSH
+ Clés SSH
-
CHROOT_PATH
Chemin Chroot
-
- SELECT_CHROOT_PATH
- Selectionnez le chemin du Chroot
+ CHROOT_PATH_NOT_GIVEN
+ Chemin Chroot non défini
-
- VPN_ACCESS
- VPN + Accs RSSH
+ CHROOT_PATH_NON_EXISTANT
+ Le chemin Chroot n'existe pas
-
- SHELL_ACCESS
- Accs au Shell
-
-
-
- SUDOER_ACCESS
- Accs Sudo
+ SELECT_CHROOT_PATH
+ Sélectionnez le chemin Chroot
-
- MODIFY
- Modifier
+ VPN_ACCESS
+ VPN + Accès RSSH
-
- YES
- Oui
+ SHELL_ACCESS
+ Accès au Shell
-
- NO
- Non
+ SUDOER_ACCESS
+ Accès Sudo
-
- SAVE
- Enregistrer
+ NO_ACCOUNTS
+ Aucun compte utilisateur n'a été défini dans le système.
-
SUCCESS
- Modifications enregistres avec succs.
+ Modifications enregistrées avec succès.
-
MODIFY_DESCRIPTION
-
- Autoriser l'accs au shell un utilisateur est un risque de scurit.
- Utilisez cette option seulement si vous tes concient de ce que vous faites.
- Une option plus sre consiste autoriser l'accs rssh (sftp, ssh & rsync).
-
-
- L'accs Sudo permet aux utilisateurs d'excuter des commandes avec les permissions
- du compte root sans en connaitre le mot de passe. C'est une meilleure solution que de
- donner le mot de passe root tort et travers. Configurer Sudo sur "oui" configure
- galement l'accs au shell sur "bash".
-
-
- L'accs au SHELL, VPN & FTP pour les utilisateurs dpend des rglages appliques dans
- le Panneau d'Accs distance.
-
-
- Selectionnez le chemin du dossier de Chroot pour le FTP dans le menu droulant
- ou entrez le chemin dans le champ texte (la slection crasera le champ texte)
-
-
- Entrez les cls publiques SSH Keys pour autoriser l'accs ssh sans mot de passe,
- chaque cl devant tre colle sur une seule ligne (l'affichage sera tronqu sur
- 3 lignes ou plus).
- Pour supprimer toutes les cls, tapez "deletekeys".
-
- ]]>
-
+ Autoriser l'accès au shell à un utilisateur présente un risque au niveau de la sécurité. N'utilisez cette option que si vous êtes conscient de ce que vous faites. Une option plus sûre consiste à n'autoriser que l'accès rssh (sftp, ssh & rsync). L'accès Sudo permet aux utilisateurs d'exécuter des commandes avec les permissions du compte root sans en connaître le mot de passe. C'est une meilleure solution que de fournie le mot de passe root à des tiers. Configurer Sudo sur "oui" configure également l'accès au shell avec "bash".
L'accès au SHELL, VPN & FTP pour les utilisateurs dépend des paramètres définis dans le Panneau d'Accès à distance.
Sélectionnez le chemin du dossier de Chroot pour le FTP dans le menu déroulant ou entrez le chemin dans le champ texte (la sélection écrase le champ texte)
Entrez les clés publiques SSH pour autoriser l'accès ssh sans mot de passe, chaque clé devant être collée sur une seule ligne (l'affichage sera tronqué sur 3 lignes ou plus). Pour supprimer toutes les clés, tapez "deletekeys".
]]>
-
SSHKEYS_DESCRIPTION
-
- Entrez les cls publiques SSH Keys pour autoriser l'accs ssh sans mot de passe,
- chaque cl devant tre colle sur une seule ligne (l'affichage sera tronqu sur
- 3 lignes ou plus).
- Pour supprimer toutes les cls, tapez "deletekeys".
-
- ]]>
-
+ Entrez les clés publiques SSH Keys pour autoriser l'accès ssh sans mot de passe, chaque clé devant être collée sur une seule ligne (l'affichage sera tronqué sur 3 lignes ou plus). Pour supprimer toutes les clés, tapez "deletekeys".
-
INVALID_USER
Compte invalide
-
-
- NO_ACCOUNTS
- Aucun compte utilisateur n'a t dfini dans le systme.
-
-
--- /dev/null 2008-03-05 09:51:41.697912024 -0700
+++ pootleupdate/root/etc/e-smith/locale/hu/etc/e-smith/web/functions/remoteuseraccess 2008-03-11 02:24:43.000000000 -0600
@@ -0,0 +1,86 @@
+
+
+ User Remote Access
+ User Remote Access
+
+
+ SSH keys
+ SSH keys
+
+
+ FORM_TITLE
+ Change user remote access settings
+
+
+ CURRENT_LIST_OF_USERS
+ Current list of users
+
+
+ LABEL_USER
+ Felhasználói fiók
+
+
+ LABEL_FULLNAME
+ User Name
+
+
+ SHELL_ACCESS
+ Shell
+
+
+ SUDO
+ Sudo
+
+
+ SSH_KEYS
+ SSH Keys
+
+
+ CHROOT_PATH
+ Chroot Path
+
+
+ CHROOT_PATH_NOT_GIVEN
+ Chroot Path not given
+
+
+ CHROOT_PATH_NON_EXISTANT
+ Chroot Path does not exist
+
+
+ SELECT_CHROOT_PATH
+ Select Chroot Path
+
+
+ VPN_ACCESS
+ RSSH + VPN Access
+
+
+ SHELL_ACCESS
+ Shell Access
+
+
+ SUDOER_ACCESS
+ Sudo Access
+
+
+ NO_ACCOUNTS
+ There are no user accounts in the system.
+
+
+ SUCCESS
+ Success
+
+
+ MODIFY_DESCRIPTION
+ Enabling bash shell access for a user account poses a security risk. Only use this option if you know what you are doing. A safer option is to allow rssh access (sftp, ssh & rsync). Sudo access allows users to execute commands with the permissions of the root account without knowing the root password. This is more desirable than passing around the root password. Setting Sudo to yes also sets the shell to bash
SHELL, VPN & FTP access for users depend on the settings in the Remote Access Panel being opened.
Select an FTP Chroot path from the drop down box or enter it in the text field, the selection will overwrite the text field.
Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".
]]>
+
+
+ SSHKEYS_DESCRIPTION
+ Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".
+
+
+ INVALID_USER
+ Invalid user
+
+
--- /dev/null 2008-03-05 09:51:41.697912024 -0700
+++ pootleupdate/root/etc/e-smith/locale/id/etc/e-smith/web/functions/remoteuseraccess 2008-03-11 02:25:13.000000000 -0600
@@ -0,0 +1,86 @@
+
+
+ User Remote Access
+ User Remote Access
+
+
+ SSH keys
+ SSH keys
+
+
+ FORM_TITLE
+ Change user remote access settings
+
+
+ CURRENT_LIST_OF_USERS
+ Current list of users
+
+
+ LABEL_USER
+ Akun
+
+
+ LABEL_FULLNAME
+ User Name
+
+
+ SHELL_ACCESS
+ Shell
+
+
+ SUDO
+ Sudo
+
+
+ SSH_KEYS
+ SSH Keys
+
+
+ CHROOT_PATH
+ Chroot Path
+
+
+ CHROOT_PATH_NOT_GIVEN
+ Chroot Path not given
+
+
+ CHROOT_PATH_NON_EXISTANT
+ Chroot Path does not exist
+
+
+ SELECT_CHROOT_PATH
+ Select Chroot Path
+
+
+ VPN_ACCESS
+ RSSH + VPN Access
+
+
+ SHELL_ACCESS
+ Shell Access
+
+
+ SUDOER_ACCESS
+ Sudo Access
+
+
+ NO_ACCOUNTS
+ There are no user accounts in the system.
+
+
+ SUCCESS
+ Berhasil
+
+
+ MODIFY_DESCRIPTION
+ Enabling bash shell access for a user account poses a security risk. Only use this option if you know what you are doing. A safer option is to allow rssh access (sftp, ssh & rsync). Sudo access allows users to execute commands with the permissions of the root account without knowing the root password. This is more desirable than passing around the root password. Setting Sudo to yes also sets the shell to bash
SHELL, VPN & FTP access for users depend on the settings in the Remote Access Panel being opened.
Select an FTP Chroot path from the drop down box or enter it in the text field, the selection will overwrite the text field.
Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".
]]>
+
+
+ SSHKEYS_DESCRIPTION
+ Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".
+
+
+ INVALID_USER
+ Invalid user
+
+
--- /dev/null 2008-03-05 09:51:41.697912024 -0700
+++ pootleupdate/root/etc/e-smith/locale/it/etc/e-smith/web/functions/remoteuseraccess 2008-03-11 02:25:44.000000000 -0600
@@ -0,0 +1,86 @@
+
+
+ User Remote Access
+ User Remote Access
+
+
+ SSH keys
+ SSH keys
+
+
+ FORM_TITLE
+ Change user remote access settings
+
+
+ CURRENT_LIST_OF_USERS
+ Current list of users
+
+
+ LABEL_USER
+ Utente
+
+
+ LABEL_FULLNAME
+ Nome Utente
+
+
+ SHELL_ACCESS
+ Shell
+
+
+ SUDO
+ Sudo
+
+
+ SSH_KEYS
+ SSH Keys
+
+
+ CHROOT_PATH
+ Chroot Path
+
+
+ CHROOT_PATH_NOT_GIVEN
+ Chroot Path not given
+
+
+ CHROOT_PATH_NON_EXISTANT
+ Chroot Path does not exist
+
+
+ SELECT_CHROOT_PATH
+ Select Chroot Path
+
+
+ VPN_ACCESS
+ RSSH + VPN Access
+
+
+ SHELL_ACCESS
+ Shell Access
+
+
+ SUDOER_ACCESS
+ Sudo Access
+
+
+ NO_ACCOUNTS
+ Non ci sono utenti nel sistema.
+
+
+ SUCCESS
+ Successo
+
+
+ MODIFY_DESCRIPTION
+ Enabling bash shell access for a user account poses a security risk. Only use this option if you know what you are doing. A safer option is to allow rssh access (sftp, ssh & rsync). Sudo access allows users to execute commands with the permissions of the root account without knowing the root password. This is more desirable than passing around the root password. Setting Sudo to yes also sets the shell to bash
SHELL, VPN & FTP access for users depend on the settings in the Remote Access Panel being opened.
Select an FTP Chroot path from the drop down box or enter it in the text field, the selection will overwrite the text field.
Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".
]]>
+
+
+ SSHKEYS_DESCRIPTION
+ Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".
+
+
+ INVALID_USER
+ Invalid user
+
+
--- /dev/null 2008-03-05 09:51:41.697912024 -0700
+++ pootleupdate/root/etc/e-smith/locale/nl/etc/e-smith/web/functions/remoteuseraccess 2008-03-11 02:26:15.000000000 -0600
@@ -0,0 +1,86 @@
+
+
+ User Remote Access
+ Toegang voor gebruiker op afstand
+
+
+ SSH keys
+ SSH sleutels
+
+
+ FORM_TITLE
+ Verander instellingen voor gebruiker op afstand
+
+
+ CURRENT_LIST_OF_USERS
+ Huidige lijst met gebruikers
+
+
+ LABEL_USER
+ Account
+
+
+ LABEL_FULLNAME
+ Gebruikersnaam
+
+
+ SHELL_ACCESS
+ Shell
+
+
+ SUDO
+ Sudo
+
+
+ SSH_KEYS
+ SSH sleutels
+
+
+ CHROOT_PATH
+ Chroot Pad
+
+
+ CHROOT_PATH_NOT_GIVEN
+ Chroot Pad niet opgegeven
+
+
+ CHROOT_PATH_NON_EXISTANT
+ Chroot Pad bestaat niet
+
+
+ SELECT_CHROOT_PATH
+ Kies Chroot Pad
+
+
+ VPN_ACCESS
+ RSSH + VPN toegang
+
+
+ SHELL_ACCESS
+ Shell Toegang
+
+
+ SUDOER_ACCESS
+ Sudo Toegang
+
+
+ NO_ACCOUNTS
+ Er zijn geen gebruiker accounts in het systeem.
+
+
+ SUCCESS
+ Succes
+
+
+ MODIFY_DESCRIPTION
+ Toestaan van bash shell toegang voor een gebruikers account is een veiligheidsrisico. Gebruik deze optie alleen als u weet wat u doet. Een veiliger optie is toestaan van rssh toegang (sftp, ssh & rsync). Sudo toegang staat gebruikers toe tot het uitvoeren van commando's met de rechten van het root account zonder het root wachtwoord te kennen. Dit is wenselijker dan het wachtwoord van het root account verspreiden. Door de instelling van Sudo op Ja te zetten wordt ook de shell op bash gezet
SHELL, VPN & FTP toegang coor de gebruikers hangt af van de instellingen in het Toegang Op Afstand Scherm.
Kies een FTP chroot pad uit het uittrek menu of geef er één op in het tekstveld; de keuze zal de inhoud van het tekstveld overschrijven.
Geef de publieke SSH sleutels op om toegang voor ssh toe te staan zonder wachtwoord, sleutels moeten worden geplakt als één enkele regel maar zullen worden verspreid over die of meer regels in het scherm. Om alle sleutels te verwijderen, type dan "deletekeys".
]]>
+
+
+ SSHKEYS_DESCRIPTION
+ Geef de publieke SSH sleutels op om toegang voor ssh toe te staan zonder wachtwoord, sleutels moeten worden geplakt als één enkele regel maar zullen worden verspreid over die of meer regels in het scherm. Om alle sleutels te verwijderen, type dan \"deletekeys\".
+
+
+ INVALID_USER
+ Ongeldige gebruiker
+
+
--- /dev/null 2008-03-05 09:51:41.697912024 -0700
+++ pootleupdate/root/etc/e-smith/locale/pt/etc/e-smith/web/functions/remoteuseraccess 2008-03-11 02:26:45.000000000 -0600
@@ -0,0 +1,86 @@
+
+
+ User Remote Access
+ Acesso Remoto do Usuário
+
+
+ SSH keys
+ Chaves SSH
+
+
+ FORM_TITLE
+ Mudar configurações de acesso remoto do usuário
+
+
+ CURRENT_LIST_OF_USERS
+ Lista atual de usuários
+
+
+ LABEL_USER
+ Conta
+
+
+ LABEL_FULLNAME
+ Nome do Usuário
+
+
+ SHELL_ACCESS
+ Shell
+
+
+ SUDO
+ Sudo
+
+
+ SSH_KEYS
+ Chaves SSH
+
+
+ CHROOT_PATH
+ Caminho do CHROOT
+
+
+ CHROOT_PATH_NOT_GIVEN
+ Caminho do CHROOT não fornecido
+
+
+ CHROOT_PATH_NON_EXISTANT
+ Caminho do CHROOT não existe
+
+
+ SELECT_CHROOT_PATH
+ Selecione o caminho do CHROOT
+
+
+ VPN_ACCESS
+ Acesso RSSH e VPN
+
+
+ SHELL_ACCESS
+ Acesso Shell
+
+
+ SUDOER_ACCESS
+ Acesso Sudo
+
+
+ NO_ACCOUNTS
+ Não há contas de usuário neste sistema.
+
+
+ SUCCESS
+ Sucesso
+
+
+ MODIFY_DESCRIPTION
+ Habilitar acesso shellpara a conta de usuário é um risco de segurança. Apenas use esta opção se você souber o que está fazendo. Uma opção mais segura é permitir acesso RSSH (sftp, ssh & rsync). Acesso Sudo permite os usuários executarem comandos como root sem saber a senha de root. Isto é melhor do que compartilhar a senha de root. Definir Sudo como sim também define o shell como bash
Acesso SHELL, VPN & FTP para usuários depende da configurações no painel de Acesso Remoto estarem permitidas.
Selecione um caminho CHROOT FTP Chroot da caixa de opções ou entre-o no campo de texto, se for feita uma seleção, esta prevalecerá e sobrescreverá o escrito no campo de texto.
Entre as chave de SSH públicas para permitir acesso SSH sem senhas, as chaves devem ser coladas como uma linha simples mas serão quebradas em três ou mais linhas para exibição na tela. Para apagar todas as chaves escreva "deletekeys".
]]>
+
+
+ SSHKEYS_DESCRIPTION
+ Entre as chave de SSH públicas para permitir acesso SSH sem senhas, as chaves devem ser coladas como uma linha simples mas serão quebradas em três ou mais linhas para exibição na tela. Para apagar todas as chaves escreva "deletekeys".
+
+
+ INVALID_USER
+ Usuário inválido
+
+
--- /dev/null 2008-03-05 09:51:41.697912024 -0700
+++ pootleupdate/root/etc/e-smith/locale/sl/etc/e-smith/web/functions/remoteuseraccess 2008-03-11 02:27:16.000000000 -0600
@@ -0,0 +1,86 @@
+
+
+ User Remote Access
+ User Remote Access
+
+
+ SSH keys
+ SSH keys
+
+
+ FORM_TITLE
+ Change user remote access settings
+
+
+ CURRENT_LIST_OF_USERS
+ Current list of users
+
+
+ LABEL_USER
+ Racun
+
+
+ LABEL_FULLNAME
+ Uporabnisko ime
+
+
+ SHELL_ACCESS
+ Shell
+
+
+ SUDO
+ Sudo
+
+
+ SSH_KEYS
+ SSH Keys
+
+
+ CHROOT_PATH
+ Chroot Path
+
+
+ CHROOT_PATH_NOT_GIVEN
+ Chroot Path not given
+
+
+ CHROOT_PATH_NON_EXISTANT
+ Chroot Path does not exist
+
+
+ SELECT_CHROOT_PATH
+ Select Chroot Path
+
+
+ VPN_ACCESS
+ RSSH + VPN Access
+
+
+ SHELL_ACCESS
+ Shell Access
+
+
+ SUDOER_ACCESS
+ Sudo Access
+
+
+ NO_ACCOUNTS
+ Ta uporabniski racun ne obstaja.
+
+
+ SUCCESS
+ Success
+
+
+ MODIFY_DESCRIPTION
+ Enabling bash shell access for a user account poses a security risk. Only use this option if you know what you are doing. A safer option is to allow rssh access (sftp, ssh & rsync). Sudo access allows users to execute commands with the permissions of the root account without knowing the root password. This is more desirable than passing around the root password. Setting Sudo to yes also sets the shell to bash
SHELL, VPN & FTP access for users depend on the settings in the Remote Access Panel being opened.
Select an FTP Chroot path from the drop down box or enter it in the text field, the selection will overwrite the text field.
Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".
]]>
+
+
+ SSHKEYS_DESCRIPTION
+ Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".
+
+
+ INVALID_USER
+ Invalid user
+
+
--- smeserver-remoteuseraccess-1.2/root/etc/e-smith/locale/sv/etc/e-smith/web/functions/remoteuseraccess 2007-01-05 08:29:00.000000000 -0700
+++ pootleupdate/root/etc/e-smith/locale/sv/etc/e-smith/web/functions/remoteuseraccess 2008-03-11 02:27:46.000000000 -0600
@@ -1,167 +1,86 @@
-
- Security
- Skerhet
+ User Remote Access
+ Användares fjärråtkomst
- User Remote Access
- Anvndares fjrrtkomst
-
-
- Your Settings
- Dina instllningar
-
-
- SSH keys
- SSH-nycklar
+ SSH keys
+ SSH-nycklar
-
FORM_TITLE
- ndra instllningar fr anvndares fjrrtkomst
+ Ändra inställningar för användares fjärråtkomst
-
CURRENT_LIST_OF_USERS
- Aktuell lista ver anvndare
+ Aktuell lista över användare
-
LABEL_USER
konto
-
LABEL_FULLNAME
- Anvndarnamn
+ Användarnamn
-
SHELL_ACCESS
Skal
-
SUDO
Sudo
-
SSH_KEYS
SSH-nycklar
-
CHROOT_PATH
- Chroot-skvg
+ Chroot-sökväg
CHROOT_PATH_NOT_GIVEN
- Chroot-skvg inte angiven
+ Chroot-sökväg inte angiven
CHROOT_PATH_NON_EXISTANT
- Chroot-skvg existerar inte
+ Chroot-sökväg existerar inte
-
SELECT_CHROOT_PATH
- Vlj Chroot-skvg
+ Välj Chroot-sökväg
-
VPN_ACCESS
- RSSH + VPN-tkomst
+ RSSH + VPN-åtkomst
-
SHELL_ACCESS
- Skaltkomst
+ Skalåtkomst
-
SUDOER_ACCESS
- Sudo-tkomst
-
-
-
- MODIFY
- ndra
-
-
-
- NO_ACCOUNTS
- Det finns inga anvndarkonton i systemet.
-
-
-
- YES
- Ja
-
-
-
- NO
- Nej
+ Sudo-åtkomst
-
- SAVE
- Spara
+ NO_ACCOUNTS
+ Det finns inga användarkonton i systemet.
-
SUCCESS
- Genomfrt
+ Genomfört
-
MODIFY_DESCRIPTION
-
- Tilltelse av (bash) skaltkomst fr ett anvndarkonto ger en skerhetsrisk.
- Anvnd endast denna mjlighet nr du vet vad du gr. En skrare mjlighet r att tillta
- rssh-tkomst (sftp, ssh & rsync).
-
-
- Sudo-tkomst ger anvndare mjlighet att exekvera kommando med rttigheter som
- root-kontot utan att de behver veta lsenordet fr root. Detta r en mer nskvrt
- n att ge ut lsenordet till root. Ange Sudo till ja ger ocks skal till bash
-
-
- SHELL, VPN & FTP-tkomst fr anvndare beror ven p
- instllningarna i panelen fr fjrrtkomst.
-
-
- Vlj ett FTP Chroot-skvg frn rullgardinsmenyn eller ange skvgen i
- fritextfltet. Valet i rullgardinsmenyn verrider textfltets.
-
-
- Ange de publika SSH-nycklarna som tillter ssh-tkomst utan lsenord,
- Nycklarna skall klistras in som en enstaka rad,
- men de presenteras i 3 eller fler linjer i rutan.
- Fr att radera samtliga nycklar skriv "deletekeys".
-
- ]]>
-
+ Tillåtelse av (bash) skalåtkomst för ett användarkonto ger en säkerhetsrisk. Använd endast denna möjlighet när du vet vad du gör. En säkrare möjlighet är att tillåta rssh-åtkomst (sftp, ssh & rsync). Sudo-åtkomst ger användare möjlighet att exekvera kommando med rättigheter som root-kontot utan att de behöver veta lösenordet för root. Detta är en mer önskvärt än att ge ut lösenordet till root. Ange Sudo till ja ger också skal till bash
SHELL, VPN & FTP-åtkomst för användare beror även på inställningarna i panelen för fjärråtkomst.
Välj ett FTP Chroot-sökväg från rullgardinsmenyn eller ange sökvägen i fritextfältet. Valet i rullgardinsmenyn överrider textfältets.
Ange de publika SSH-nycklarna som tillåter ssh-åtkomst utan lösenord, Nycklarna skall klistras in som en enstaka rad, men de presenteras i 3 eller fler linjer i rutan. För att radera samtliga nycklar skriv "deletekeys".
]]>
-
SSHKEYS_DESCRIPTION
-
- Ange de publika SSH-nycklarna som tillter ssh-tkomst utan lsenord,
- Nycklarna skall klistras in som en enstaka rad,
- men de presenteras i 3 eller fler linjer i rutan.
- Fr att radera samtliga nycklar skriv "deletekeys"
-
- ]]>
-
+ Ange de publika SSH-nycklarna som tillåter ssh-åtkomst utan lösenord, Nycklarna skall klistras in som en enstaka rad, men de presenteras i 3 eller fler linjer i rutan. För att radera samtliga nycklar skriv "deletekeys" ]]>
-
INVALID_USER
- Otillten anvndare
+ Otillåten användare
-